SLAPv: A Service Level Agreement Enforcer for Virtual Networks

Size: px
Start display at page:

Download "SLAPv: A Service Level Agreement Enforcer for Virtual Networks"

Transcription

1 SLAPv: A Service Level Agreement Enforcer for Virtual Networks Hugo E. T. Carvalho, Natalia C. Fernandes, and Otto Carlos M. B. Duarte Universidade Federal do Rio de Janeiro (UFRJ) Rio de Janeiro Brazil {hugo, natalia, otto}@gta.ufrj.br Guy Pujolle UPMC Sorbonne Universités Paris France {Guy.Pujolle}@lip6.fr Abstract In this paper we propose SLAPv, an efficient control system for service level agreements (SLAs) in virtual network environments. SLAPv fills a gap in the design of SLA enforcers by introducing the following set of control features:(i) verification of physical resource usage, (ii) retrieval of real-time profiles of virtual routers, and (iii) enforcement of the adequate usage of resources. Furthermore, SLAPv punishes virtual networks that do not respect their contracts. The control relies on fuzzy logic to enforce resource allocation according to usage profile of routers and the system load. The punishment depends on the exceeding violating value, and on the system load. Results obtained from a developed prototype show the efficiency of the proposed system under different conditions and strategic policies. Tests performed with RIPv2 running on virtual networks show that, for high load scenarios, misbehaving routers are forced to rapidly enter inconformitytotheirslasinlessthanfiveseconds. Index Terms Virtualization, QoS, Fuzzy, Future Internet I. INTRODUCTION The resource virtualization techniques allow the execution of multiple operational systems over the same physical hardware. This functionality is performed through a monitor, which is responsible for multiplexing hardware access and providing logical resource slices to the virtualized systems. The virtualization, which is based on the premise that virtual environments are isolated, offers advantages such as better usage of physical resources and the ease to dynamically remap virtualized resources among virtualized systems. One of the most used open source virtualization platforms is Xen [1]. Xen architecture allows innovation in computer networks because each virtual machine can act as a virtual router. Thus, a single physical router can support multiple virtual routers with distinct properties and protocol stacks, which is suitable for the pluralist architecture for the Future Internet [2]. In this paper we propose a dynamic resource controller to enforce service level agreements (SLA) in virtual networks, called SLAPv: service level agreement policies in virtualization. The originality behind SLAPv is that it relies on fuzzy logic to account for enforcing the proper behavior of virtual routers and their conformity with SLAs. The control relies on the generation and analysis of usage profiles of each virtual router. Based on this information, SLAPv detects service level violations. Misbehaving networks that violate contracts are promptly punished. Besides, the control system monitors the load of each virtual network and estimates usage profiles of each router. These router profiles are used to guarantee a better distribution of resources on physical routers, reducing the occurrence of overloads in physical routers. SLAPv also enables flexible enforcement. The proposed SLA enforcement depends on the physical system load, which means that under scenarios with plenty of resources available, SLAPv allows virtual networks to violate SLAs for some time. This flexible enforcement increases the resources utilization of the whole system and enhances the quantity of resources offered to virtual networks. Fuzzy logic is used to map flexible administrator strategies onto punishment rules, which are applied to misbehaving virtual routers. In this context, the proposal allows the control of SLAs with different strategy patterns. It also allows administrators to easily insert/modify/remove acting strategies. SLAPv achieves resource control by relying on a long list of load parameters. Besides CPU, memory, and network usage (traditionally used in the literature [3]), SLAPv also considers robustness and temperature of operation. These parameters are useful to select less error prone physical machines to avoid the allocation of critical virtual machines in unstable physical routers. SLAPv was implemented and tested. Results show that the proposal correctly punishes router violations and that the punishment is adaptive, depending on the availability of physical resources. The system conforms misbehaving routers in less than five seconds for scenarios with scarce resources. On the other hand, SLAPv reacts smoothly for scenarios with abundant resources, allowing routers that violate SLAs to obtain an additional amount of resources. The article is structured as follows. Section II describes related works and Section III explains the system elements, the generation of usage profiles, the flexible strategy system and the load and punishment controllers. Section IV shows the system results, which demonstrate the performance of the controller under different environment configurations. Section V presents our conclusions and future directions. II. RELATED WORK Most of the works on dynamic allocation of physical resources in virtualized systems focus on data center server consolidation [3] [5]. Sandpiper [3] is a system that monitors virtual machines in data centers automatically accomplishes the migration of machines. The objective of Sandpiper is to optimize the performance of each server and ensure proper working of virtual machines when they suffer behavior changes, such as an abrupt augment of accesses due to a flash crowd. Sandpiper monitors profiles of virtual machines

2 Figure 1: SLAPv architecture. Actuator of the controller agents interacts with daemons of physical routers. through time series and estimates the volume of load based on CPU, memory, and network usage. Xu et al. propose two-level control mechanisms for data centers, where the first one is global and maps virtual resources in physical resources and the second is devoted to local control [5]. The local controller maps the relation among workloads and resource usage to predict future workloads of each virtual network. Both controller functions are based on fuzzy logic. Menascé et al. apply autonomic computing techniques to control the share of processors among virtual machines in data centers [6]. Authors use optimization techniques to maximize a global utilization function on the physical nodes and apply this information in a white box controller. Keller et al. evaluate quality of service requisites in virtualized environments and propose authoring models to make the accountability and ensure SLAs in virtual routers [7]. Authors suggest two models to guarantee authoring and QoS: a model based on the monitoring of network parameters to analyze service levels and other based on trusted computing platforms. There are also platform-specific proposals to solve resource distribution in virtualized systems, such as Xen. Fernandes and Duarte proposes Xen Network Monitor, which implements a secure control system to restrict I/O resource usage among virtual routers [8]. These systems controls specifically the resources shared in a privileged domain which is shared among all virtual networks in network operations, depending on predefined SLAs. The proposed system is a local controller to virtual network environments independent of virtualization platform. Although the proposed mechanism can be used in data centers, the developed logic aims at solving challenges in virtual networks environments. This scenario differs from those found in data centers, because the main controlled parameter is not limited to processor usage, but also considers parameters that are needed to control packet forwarding, which depends of the traffic, memory and so on. III. THE PROPOSED CONTROL SYSTEM SLAPv: service level agreement policies in virtualization aims at monitoring and guaranteeing service level agreements (SLAs) in virtual networks. SLAs are defined as contracts established between infrastructure service providers and their customers, which regulate parameters such as bandwidth, delays, consumption of resources, guarantees and fines. The key idea is the generation and analysis of use profiles of virtual routers and the punishment of misbehaving routers, using fuzzy logic controller. SLAPv follows a distributed management model composed of controller agents. Each agent is associated with a set of physical routers where virtual routers execute, as seen in Figure 1. Each controller agent can be associated to a given number of domains and the network manager must decide on how these associations are accomplished. Each physical router has a control domain where a daemon monitors the allocation of physical resources, verifies in real time the conformity of SLAs, and generates the use profiles of each virtual router. Five modules compose the controller agents. The Strategy and Policy Module (SPM) holds management strategies that can be applied over physical routers under its control and updates the current strategy to be applied on each control and monitoring daemon. The Service Level Module (SLM) keeps a database that associates the SLAs with each virtual router. The Knowledge Base Module (KBM) stores the history, use profiles and the description of violations that have occurred. This module can be used to estimate future network migrations, detect the need for updates and re-negotiate contracts, adapting them to the real profile of each virtual router. The Actuator Module executes within the control and monitoring daemons and retrieves the profiles and statistics of each virtual router. The controllers also have a Communication Module (Comm), which allows the exchange of information among other controllers through secure channels. If necessary, the controllers may use those channels to negotiate actuation domains changes and negotiate virtual elements migration. Physical routers also participate from the control system through the daemon that executes within the monitoring and control domain. This daemon, besides receiving data from the controller agents, such as the level of punishment for each virtual router, also performs two important functions. First, the daemon evaluates and generates resource patterns to create the virtual router profiles. Besides that, the daemon estimates the system load based on monitored data for each virtual router. A. Generating Router Profiles The use profile of each virtual router represents the resource consumption pattern of each virtual router. Profiles can be used to detect rule violations, to estimate the use of resources, and to predict future needs. Profiles are generated through the capture

3 of memory, processor and network utilization over time, to store the recent past and the long past of those variables. There are two sliding windows with distinct sizes to store those two time series. The sliding windows help the detection of time correlation between measurements. The recent past reflects a closer machine state and allows fast detection for SLA violations whilst the long past is used to predict future behaviors and estimate possible future demands. The generation of profiles based on probabilistic density functions is used in Sandpiper [3] to capture time series which reflects the resource consumption pattern of memory, processor and network. Behaviors are analyzed through probability functions. In our proposal, we use probability density functions (PDFs) to demonstrate the probability that a given event happens inside a set of measurements in the long past window. So, the PDF can indicate, among others, the probability of consumption of resources, such as processor use. We also use Cumulative Distribution Functions (CDF) to verify service level agreements in the short past window. The CDFs describe the amount of resources that were utilized in relation to the total time inside the window. Thus, it is a good estimator to define and verify fulfillment of SLAs. Through this perspective, we can think of flexible SLAs. Probability Density Function Processor Use (%) (a) Probability Density Function. Cumulative Dist. Function Processor Use (%) (b) Cumulative Function. Figure 2: Processor utilization profiles of a RIPv2 virtual router. In order to exemplify the profile use based on probability distributions, we have developed a prototype to generate profiles and generated a test 1, as seen in Fig. 2. A probability distribution function of processor use inside a virtual router with RIPv2, generated by our system, can be seen in Fig. 2(a). We can see that the exchange of control messages generated an approximated use of 0,7% of CPU in 30% of the measurements in the long past window observed. The cumulative distribution function of the same scenario can be seen in Fig. 2(b). There, we can see that the virtual router uses, in average, only 0,7% of processor resources in 80% of the observations in the long past window. Due to this properties, we can conclude that in this scenario we can aggregate a small set of RIPv2 routers with similar properties (for example, 10 routers) and allocate a single processor to be shared among them, avoiding performance loss in the exchange of control messages. 1 In this test scenario, there are four physical routers executing Xen and inside each routers there is a virtual router. We create logical links among them and execute RIPv2 routing protocol with XORP [9], which exchanges control messages. We have also considered a long past window of 200 observations to generate the PDF and the short past window of 20 observations to generate the CDF. The sampling interval is one second between measurements. B. Estimating System Load in Control Daemons The system load is a measurement that indicates the load level of the managed hardware. Thus, it is possible to detect saturation of resources. The load measurement involves multiple parameters such as processor use, memory use, network use, temperature of components, system robustness and so on. The monitoring uses information gathered from the operational system from the monitoring and control domain. The monitored information is processed by a fuzzy controller to generate the system load. We have adopted the fuzzy controllers due to its adequacy for decision making problems that involve uncertainties, imprecisions or qualitative values, such as the strategies of a network manager. In fuzzy logic a given element belongs to a group according to a membership level inside the continuous interval [0,1], where µ A (x) : X [0,1] defines a membership function. So, given the set of membership functions µ Proc, µ Mem, µ Net, µ Temp e µ Rob, corresponding to processor, memory, network, processor temperature and system robustness, respectively, we can associate each of the resources or parameters into fuzzyfied variables. It is important to notice that the specified curves, which are called membership functions, reflect the configuration of a particular network manager. The combination of membership levels generates an output defined as system load, which has values in the interval [0,1] and represents the load of physical resources of the system. This value can then be used to estimate future migrations. Besides, the system load is used as input parameter to the punishment controller. The punishment controller also receives the input delta, which is used to estimate the level of the violation performed by virtual routers. A block diagram of the Strategy and Policy Module (SPM), which has the two mentioned controllers 2, can be seen in Fig. 3. 1) Strategies Based on Inference Rules: The fuzzy controller strategies are based on the default fuzzy inference rules of the fuzzy system. Those rules follows the IF THEN pattern which represents the current action strategy scheme. The set of rules that defines a strategy is named a strategy package. An example of strategy package that calculates the punishment level according to the difference between the contracted SLA and the current resource use, denoted by delta, and the system load can be seen in Table I. Strategy Package If Delta (low) and Load (low) Then Punishment (low) If Delta (average) and Load (low) Then Punishment (low) If Delta (high) and Load (low) Then Punishment (average) If Delta (low) and Load (high) Then Punishment (average) If Delta (average) and Load (high) Then Punishment (high) If Delta (high) and Load (high) Then Punishment (high) Table I: Example of a piece of a strategy package. The presented strategy package corresponds to a network manager policy that establishes that even huge SLA violations is not punished severely, when the system is lightly loaded, because the system has plenty of resources and at this moment, 2 To both controllers, we adopt the Mamdani implication method, with Zadeh [10] logical operations and the centroid method of defuzzyfication.

4 Figure 3: Strategy and Policy Module. giving additional resources to the violating router do not disturb the others. On the other hand, when the system is overloaded, the network manager is more rigorous and even light violations are punished severely. These rules work together with the membership functions that can be also developed by the network manager. It is possible to easily insert new rules and strategies and the controller agent must export the strategy packages to the daemon that must use the defined strategy. We can also establish different strategies for each resource under control, enhancing the flexibility of the controller. 2) Load Policies: After the application of the inference rules, fuzzy values are generated to represent the level of pertinence of each inference rule and then those values are mapped into a single controller output, which is a value in the interval [0, 1] which represents the current system load. Given the configurations and membership functions, it is possible to verify the relationship among the punishment level, the system load and delta, i.e., the level of SLA violation. This relationship can be viewed in Figure 4. In those surfaces, we can see that a given policy defines how the punishment level varies. Besides, the combination of different inference rules and membership functions generate different surfaces. In the conservative policy, we can see that punishments are severe only when delta is high and the system is overloaded (Figure 4(a)) whilst in the aggressive policy, small positive variations in system load and in delta generate high levels of punishment (Figure 4(b)). The application of a conservative strategy may allow a better usage of idle resources by violating routers, while the aggressive strategy can let idle resources with the tradeoff of ensuring that all virtual routers can use its own share of resources and that the system will rapidly control violations in SLAs. 3) Controlling the System Overload and SLAs: SLAPv is capable of generating use profiles, evaluating if profiles correspond to established SLAs, generating estimating the system load and punishing virtual routers that violate the proposed rules. In the implementation of the prototype, the daemon that executes within each domain performs the parameter gathering at each given sampling interval, which can be defined by the network manager. The parameters are used to generate temporal series that represents the variation in the use of each resource and the statistics and distributions that allow Punishment Load Delta (a) Conservative decision surface. Punishment Load Delta (b) Agressive decision surface. Figure 4: Decision surfaces for different management strategies. the verification of profiles and the compliance with SLAs. This information is send to the controller agent. The daemon within the controller agent verifies if the use profiles of virtual routers match the contracted SLAs. Besides, it aggregates the resources used by each virtual routers to estimate the total physical system load. Based on this information, we can calculate delta. The system them uses delta end the system load to make the decision of which is the adequate level of punishment that must be applied in the violating router. IV. RESULTS In order to validate SLAPv, we developed a few experiments with a prototype which proves that the proposal works and adaptively control SLAs. In the test environment, we selected the Xen platform to create virtual routers. The control parameter used in the tests is the caps. In Xen, caps regulates the amount of processor use that each virtual element can use. By doing so, when we manipulate caps, we can control the processor resource use of each virtual router. There are also other tools that can be used to control the network, such as Traffic Control (TC) [11], which allows the management of packet queues, managing the throughput of each virtual router in case of SLA violations. Tests were performed in a physical machine with a core i7 860 processor with four real cores and 8 GB RAM DDR3. The machine is configured with Xen hypervisor 4.0. Virtual routers are configured with 128 MB of RAM memory and access to a single virtual processor. Both virtual routers and monitoring and control domain are configured with Debian Lenny and kernel amd64 with the needed patches to enable support to Xen.

5 The first experiment verifies the behavior of the proposed controller and the fuzzy punishment mechanism. In order to execute the test, we select one virtual router. The SLA of this router defines among other rules that the router can use up to 85% of processor to execute packet forwarding and exchange of control messages. After that, we have created a packet flow that is forwarded through the router. When the virtual router forwards the traffic, a SLA violation occurs. The router extrapolates its SLA and the control system regulates through caps the amount of processor that can be used by the virtual router. In the experiment, the interval between SLA verifications was defined as one second. The punishment system was enabled 60 seconds after the time when the router started using more than its SLA allows. Processor Usage of Virtual Router (%) high load medium load low load 85 established SLA Time (s) (a) Different system loads. Virtual Router (%) with controller without controller established SLA Time (s) (b) Router violating SLA until t=60 s. Figure 5: Efficiency of the controller in different scenarios. To perform these experiments, we define three scenarios. In the first scenario, there is only the monitored router itself and other virtual router that only exchanges control messages from RIPv2 with other routers in other machines. In this case, the system load metric was considered low. In the second scenario, there is the monitored router and a set of five virtual routers, each one using a moderate amount of resources, which generated a load value of approximately, defined in the system load metric as medium load. In the third scenario, there are seven virtual routers beside the monitored one and all of them are using resources up to their SLA limits. The system load was reported as approximately 0.6, which was defined as high system load. For each of the scenarios we execute only a single test round. Results seen in Fig. 5(a) shows that the system converges to ensure the established SLA. In these tests, we used the conservative policy. Depending on the system load, for each environment, the punishment level varies. We can see that in low load scenarios, the punishment level is low and the system takes up to 40 seconds before the SLA is fully respected. In medium load, the punishment is more intense and converges in less than 15 seconds. In the high load scenario the punishment is severe and the system converges to the SLA in less than five seconds. We realize that our proposal fulfill the established requisites, acting in a conservative fashion in situations with plenty of resources and aggressively in critical situations. If significant changes happens in the system load value, the observed results will change, reflecting the system load variation during the convergence of the system. The second experiment validates the proposed controller when a given virtual router extrapolates its SLAs for a given period, and after that, respects its SLAs. In the experiment, the virtual router forwards a huge amount of traffic and saturates its processor. After 60 seconds, the router forwards at a lower rate, respecting its SLA due to the processor usage of 80%. In this result, the system load remained as medium. Results are shown in Fig. 5(b). We can observe that without the controller, the virtual router can use all the available resources, allowing it to hassle the behavior and SLA of other virtual routers. We can see that in this case the processor measurement shows some variations. This happens due to small oscillations in the measurement tools. When the caps parameter limits a router to use less than it tries to use, this limit is due to the caps so there is no variations. When the virtual router uses an amount of processor that is smaller than caps, variations can occur. When we use SLAPv, the virtual router has its caps limited gradually until it starts to respect the established contract. V. CONCLUSIONS In this work, we developed SLAPv, a fuzzy control prototype to enforce service level agreements in virtual network environments, in which the lack of isolation properties represents a challenge. Network managers can easily design and apply their own strategy packages that is a set of rules that reflect their own experiences in network decision making. The results show that the system can control the established SLAs, punishing routers that violate SLA rules, according to the system load and the violation level. In the test environment, the system limited adaptively the SLA. When there are plenty of resources, the SLAPv applies light punishments and in critical moments the system applies severe punishments. The system rapidly converges in less than five seconds for heavy load scenarios and, on the other hand, smoothly accommodates the resource usage in up to 40 seconds when resource load is low in our test scenarios. REFERENCES [1] M. Bourguiba, K. Haddadou, and G. Pujolle, Evaluating xen-based virtual routers performance, International Journal of Communication Networks and Distributed Systems, vol. 6, no. 3, pp , [2] N. C. Fernandes, M. D. D. Moreira, I. M. Moraes, L. H. G. Ferraz, R. S. Couto, H. E. T. Carvalho, M. E. M. Campista, L. H. M. K. Costa, and O. C. M. B. Duarte, Virtual networks: Isolation, performance, and trends, vol. 66, no. 5-6, pp , Jun [3] T. Wood, P. Shenoy, A. Venkataramani, and M. Yousif, Black-box and gray-box strategies for virtual machine migration, in Proceedings of the Networked Systems Design and Implementation (NSDI), 2007, pp [4] X. Meng, V. Pappas, and L. Zhang, Improving the scalability of data center networks with traffic-aware virtual machine placement, in Proceedings of INFOCOM IEEE, 2010, pp [5] J. Xu, M. Zhao, J. Fortes, R. Carpenter, and M. Yousif, Autonomic resource management in virtualized data centers using fuzzy logic-based approaches, Cluster Computing, vol. 11, no. 3, pp , [6] D. Menasce and M. Bennani, Autonomic virtualized environments, in Autonomic and Autonomous Systems, ICAS International Conference on. IEEE, 2006, pp [7] E. Keller, R. Lee, and J. Rexford, Accountability in hosted virtual networks, in Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures. ACM, 2009, pp [8] N. C. Fernandes and O. C. M. B. Duarte, Xnetmon: A network monitor for securing virtual networks, in Proceedings of IEEE International Conference on Communications (ICC 11), Jun. 2011, pp [9] M. Handley, O. Hodson, and E. Kohler, XORP: An open platform for network research, ACM SIGCOMM Computer Communication Review, vol. 33, no. 1, pp , [10] L. Zadeh, Fuzzy sets, Information and control, vol. 8, no. 3, pp , [11] W. Almesberger et al., Linux network traffic control: implementation overview, in Sixth IEEE Symposium on, vol. 2001, 1999, pp

XNetMon: A Network Monitor for Securing Virtual Networks

XNetMon: A Network Monitor for Securing Virtual Networks : A Network Monitor for Securing Virtual Networks Natalia Castro Fernandes and Otto Carlos Muniz Bandeira Duarte Universidade Federal do Rio de Janeiro - GTA/COPPE/UFRJ Rio de Janeiro, Brazil Abstract

More information

Black-box and Gray-box Strategies for Virtual Machine Migration

Black-box and Gray-box Strategies for Virtual Machine Migration Black-box and Gray-box Strategies for Virtual Machine Migration Wood, et al (UMass), NSDI07 Context: Virtual Machine Migration 1 Introduction Want agility in server farms to reallocate resources devoted

More information

VNEXT: Virtual NEtwork management for Xen-based Testbeds

VNEXT: Virtual NEtwork management for Xen-based Testbeds VNEXT: Virtual NEtwork management for Xen-based Testbeds Pedro S. Pisa 1, Rodrigo S. Couto 1, Hugo E. T. Carvalho 1, Daniel J. S. Neto 1, Natalia C. Fernandes 1, Miguel Elias M. Campista 1, Luís Henrique

More information

Virtual Networks: Isolation, Performance, and Trends

Virtual Networks: Isolation, Performance, and Trends Annals of Telecommunications manuscript No. (will be inserted by the editor) Virtual Networks: Isolation, Performance, and Trends Natalia C. Fernandes Marcelo D. D. Moreira Igor M. Moraes Lyno Henrique

More information

Dynamic Load Balancing of Virtual Machines using QEMU-KVM

Dynamic Load Balancing of Virtual Machines using QEMU-KVM Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College

More information

Enhancing the Scalability of Virtual Machines in Cloud

Enhancing the Scalability of Virtual Machines in Cloud Enhancing the Scalability of Virtual Machines in Cloud Chippy.A #1, Ashok Kumar.P #2, Deepak.S #3, Ananthi.S #4 # Department of Computer Science and Engineering, SNS College of Technology Coimbatore, Tamil

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Energy Constrained Resource Scheduling for Cloud Environment

Energy Constrained Resource Scheduling for Cloud Environment Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering

More information

On the Use of Fuzzy Modeling in Virtualized Data Center Management Jing Xu, Ming Zhao, José A. B. Fortes, Robert Carpenter*, Mazin Yousif*

On the Use of Fuzzy Modeling in Virtualized Data Center Management Jing Xu, Ming Zhao, José A. B. Fortes, Robert Carpenter*, Mazin Yousif* On the Use of Fuzzy Modeling in Virtualized Data Center Management Jing Xu, Ming Zhao, José A. B. Fortes, Robert Carpenter*, Mazin Yousif* Electrical and Computer Engineering, University of Florida *Intel

More information

Evaluating Virtual Router Performance for a Pluralist Future Internet

Evaluating Virtual Router Performance for a Pluralist Future Internet Evaluating Virtual Router Performance for a Pluralist Future Internet Diogo M. F. Mattos, Lyno Henrique G. Ferraz, Luís Henrique M. K. Costa, and Otto Carlos M. B. Duarte Universidade Federal do Rio de

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues

More information

Performance Testing. Slow data transfer rate may be inherent in hardware but can also result from software-related problems, such as:

Performance Testing. Slow data transfer rate may be inherent in hardware but can also result from software-related problems, such as: Performance Testing Definition: Performance Testing Performance testing is the process of determining the speed or effectiveness of a computer, network, software program or device. This process can involve

More information

A real situation of OpenStack based cloud computing

A real situation of OpenStack based cloud computing A real situation of OpenStack based cloud computing łuinea Tudor Faculty of Mathematics and Informatics Spiru Haret University CAMAI 2015 Bucharest, June 12-13, 2015 1 Abstract Cloud Computing - exemplified

More information

QoS Integration in Web Services

QoS Integration in Web Services QoS Integration in Web Services M. Tian Freie Universität Berlin, Institut für Informatik Takustr. 9, D-14195 Berlin, Germany tian @inf.fu-berlin.de Abstract: With the growing popularity of Web services,

More information

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing N.F. Huysamen and A.E. Krzesinski Department of Mathematical Sciences University of Stellenbosch 7600 Stellenbosch, South

More information

Efficient Load Balancing using VM Migration by QEMU-KVM

Efficient Load Balancing using VM Migration by QEMU-KVM International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele

More information

Autonomic resource management for the Xen Hypervisor

Autonomic resource management for the Xen Hypervisor Autonomic resource management for the Xen Hypervisor Íñigo Goiri and Jordi Guitart Universitat Politécnica de Catalunya Barcelona, Spain {igoiri,jguitart}@ac.upc.es Abstract Servers workload varies during

More information

PEPPERDATA IN MULTI-TENANT ENVIRONMENTS

PEPPERDATA IN MULTI-TENANT ENVIRONMENTS ..................................... PEPPERDATA IN MULTI-TENANT ENVIRONMENTS technical whitepaper June 2015 SUMMARY OF WHAT S WRITTEN IN THIS DOCUMENT If you are short on time and don t want to read the

More information

Virtualization Technology using Virtual Machines for Cloud Computing

Virtualization Technology using Virtual Machines for Cloud Computing International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Virtualization Technology using Virtual Machines for Cloud Computing T. Kamalakar Raju 1, A. Lavanya 2, Dr. M. Rajanikanth 2 1,

More information

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR

GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR GUEST OPERATING SYSTEM BASED PERFORMANCE COMPARISON OF VMWARE AND XEN HYPERVISOR ANKIT KUMAR, SAVITA SHIWANI 1 M. Tech Scholar, Software Engineering, Suresh Gyan Vihar University, Rajasthan, India, Email:

More information

A Novel Method for Resource Allocation in Cloud Computing Using Virtual Machines

A Novel Method for Resource Allocation in Cloud Computing Using Virtual Machines A Novel Method for Resource Allocation in Cloud Computing Using Virtual Machines Ch.Anusha M.Tech, Dr.K.Babu Rao, M.Tech, Ph.D Professor, MR. M.Srikanth Asst Professor & HOD, Abstract: Cloud computing

More information

Black-box and Gray-box Strategies for Virtual Machine Migration

Black-box and Gray-box Strategies for Virtual Machine Migration Black-box and Gray-box Strategies for Virtual Machine Migration Timothy Wood, Prashant Shenoy, Arun Venkataramani, and Mazin Yousif Univ. of Massachusetts Amherst Intel, Portland Abstract Virtualization

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

Managed Virtualized Platforms: From Multicore Nodes to Distributed Cloud Infrastructures

Managed Virtualized Platforms: From Multicore Nodes to Distributed Cloud Infrastructures Managed Virtualized Platforms: From Multicore Nodes to Distributed Cloud Infrastructures Ada Gavrilovska Karsten Schwan, Mukil Kesavan Sanjay Kumar, Ripal Nathuji, Adit Ranadive Center for Experimental

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

Group Based Load Balancing Algorithm in Cloud Computing Virtualization

Group Based Load Balancing Algorithm in Cloud Computing Virtualization Group Based Load Balancing Algorithm in Cloud Computing Virtualization Rishi Bhardwaj, 2 Sangeeta Mittal, Student, 2 Assistant Professor, Department of Computer Science, Jaypee Institute of Information

More information

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004

More information

DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION

DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies

More information

IMPLEMENTATION OF VIRTUAL MACHINES FOR DISTRIBUTION OF DATA RESOURCES

IMPLEMENTATION OF VIRTUAL MACHINES FOR DISTRIBUTION OF DATA RESOURCES INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF VIRTUAL MACHINES FOR DISTRIBUTION OF DATA RESOURCES M.Nagesh 1, N.Vijaya Sunder Sagar 2, B.Goutham 3, V.Naresh 4

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

Delivering Quality in Software Performance and Scalability Testing

Delivering Quality in Software Performance and Scalability Testing Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Exploring Resource Provisioning Cost Models in Cloud Computing

Exploring Resource Provisioning Cost Models in Cloud Computing Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department

More information

The Benefits of POWER7+ and PowerVM over Intel and an x86 Hypervisor

The Benefits of POWER7+ and PowerVM over Intel and an x86 Hypervisor The Benefits of POWER7+ and PowerVM over Intel and an x86 Hypervisor Howard Anglin rhbear@us.ibm.com IBM Competitive Project Office May 2013 Abstract...3 Virtualization and Why It Is Important...3 Resiliency

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

A SLA-Based Method for Big-Data Transfers with Multi-Criteria Optimization Constraints for IaaS

A SLA-Based Method for Big-Data Transfers with Multi-Criteria Optimization Constraints for IaaS A SLA-Based Method for Big-Data Transfers with Multi-Criteria Optimization Constraints for IaaS Mihaela-Catalina Nita, Cristian Chilipirea Faculty of Automatic Control and Computers University Politehnica

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c

More information

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. stadler@ee.kth.

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. stadler@ee.kth. 5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se April 2008 Overview Service Management Performance Mgt QoS Mgt

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

Load Distribution in Large Scale Network Monitoring Infrastructures

Load Distribution in Large Scale Network Monitoring Infrastructures Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu

More information

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University Virtual Machine Monitors Dr. Marc E. Fiuczynski Research Scholar Princeton University Introduction Have been around since 1960 s on mainframes used for multitasking Good example VM/370 Have resurfaced

More information

Two-Level Cooperation in Autonomic Cloud Resource Management

Two-Level Cooperation in Autonomic Cloud Resource Management Two-Level Cooperation in Autonomic Cloud Resource Management Giang Son Tran, Laurent Broto, and Daniel Hagimont ENSEEIHT University of Toulouse, Toulouse, France Email: {giang.tran, laurent.broto, daniel.hagimont}@enseeiht.fr

More information

Federation of Cloud Computing Infrastructure

Federation of Cloud Computing Infrastructure IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.

More information

Black-box and Gray-box Strategies for Virtual Machine Migration

Black-box and Gray-box Strategies for Virtual Machine Migration Black-box and Gray-box Strategies for Virtual Machine Migration Timothy Wood, Prashant Shenoy, Arun Venkataramani, and Mazin Yousif Univ. of Massachusetts Amherst Intel, Portland Abstract Virtualization

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria

More information

Monitoring Performances of Quality of Service in Cloud with System of Systems

Monitoring Performances of Quality of Service in Cloud with System of Systems Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department

More information

Design of Simulator for Cloud Computing Infrastructure and Service

Design of Simulator for Cloud Computing Infrastructure and Service , pp. 27-36 http://dx.doi.org/10.14257/ijsh.2014.8.6.03 Design of Simulator for Cloud Computing Infrastructure and Service Changhyeon Kim, Junsang Kim and Won Joo Lee * Dept. of Computer Science and Engineering,

More information

Novel Systems. Extensible Networks

Novel Systems. Extensible Networks Novel Systems Active Networks Denali Extensible Networks Observations Creating/disseminating standards hard Prototyping/research Incremental deployment Computation may be cheap compared to communication

More information

IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT

IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT Muhammad Muhammad Bala 1, Miss Preety Kaushik 2, Mr Vivec Demri 3 1, 2, 3 Department of Engineering and Computer Science, Sharda

More information

Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads

Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads G. Suganthi (Member, IEEE), K. N. Vimal Shankar, Department of Computer Science and Engineering, V.S.B. Engineering College,

More information

Network Virtualization Server for Adaptive Network Control

Network Virtualization Server for Adaptive Network Control Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

WiMAX network performance monitoring & optimization

WiMAX network performance monitoring & optimization Downloaded from orbit.dtu.dk on: Nov 10, 2015 WiMAX network performance monitoring & optimization Zhang, Qi; Dam, H Published in: IEEE Network Operations and Management Symposium, 2008. NOMS 2008. DOI:

More information

Load balancing model for Cloud Data Center ABSTRACT:

Load balancing model for Cloud Data Center ABSTRACT: Load balancing model for Cloud Data Center ABSTRACT: Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement to

More information

Network Infrastructure Services CS848 Project

Network Infrastructure Services CS848 Project Quality of Service Guarantees for Cloud Services CS848 Project presentation by Alexey Karyakin David R. Cheriton School of Computer Science University of Waterloo March 2010 Outline 1. Performance of cloud

More information

AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD

AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD M. Lawanya Shri 1, Dr. S. Subha 2 1 Assistant Professor,School of Information Technology and Engineering, Vellore Institute of Technology, Vellore-632014

More information

This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 12902

This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 12902 Open Archive TOULOUSE Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited

More information

Recommendations for Performance Benchmarking

Recommendations for Performance Benchmarking Recommendations for Performance Benchmarking Shikhar Puri Abstract Performance benchmarking of applications is increasingly becoming essential before deployment. This paper covers recommendations and best

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Figure 1. VMware architecture.

Figure 1. VMware architecture. Virtual Network Performance Evaluation for Future Internet Architectures Diogo M. F. Mattos, Lyno Henrique G. Ferraz, Luís Henrique M. K. Costa, and Otto Carlos M. B. Duarte Universidade Federal do Rio

More information

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,

More information

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,

More information

QoSpy an approach for QoS monitoring in DiffServ Networks.

QoSpy an approach for QoS monitoring in DiffServ Networks. QoSpy an approach for QoS monitoring in DiffServ Networks. Ulrich Hofmann Alessandro Anzaloni Ricardo de Farias Santos. anzaloni@ele.ita.br Instituto Tecnológico de Aeronaútica São José dos Campos-SP-Brazil

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Dynamic resource management for energy saving in the cloud computing environment

Dynamic resource management for energy saving in the cloud computing environment Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Packet Sampling and Network Monitoring

Packet Sampling and Network Monitoring Packet Sampling and Network Monitoring CERN openlab Monthly Technical Meeting 13 th November, 2007 Milosz Marian Hulboj milosz.marian.hulboj@cern.ch Ryszard Erazm Jurga ryszard.jurga@cern.ch What is Network

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information

More information

Avoiding Overload Using Virtual Machine in Cloud Data Centre

Avoiding Overload Using Virtual Machine in Cloud Data Centre Avoiding Overload Using Virtual Machine in Cloud Data Centre Ms.S.Indumathi 1, Mr. P. Ranjithkumar 2 M.E II year, Department of CSE, Sri Subramanya College of Engineering and Technology, Palani, Dindigul,

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Allocation of Resources Dynamically in Data Centre for Cloud Environment

Allocation of Resources Dynamically in Data Centre for Cloud Environment Allocation of Resources Dynamically in Data Centre for Cloud Environment Mr.Pramod 1, Mr. Kumar Swamy 2, Mr. Sunitha B. S 3 ¹Computer Science & Engineering, EPCET, VTU, INDIA ² Computer Science & Engineering,

More information

Multilevel Load Balancing in NUMA Computers

Multilevel Load Balancing in NUMA Computers FACULDADE DE INFORMÁTICA PUCRS - Brazil http://www.pucrs.br/inf/pos/ Multilevel Load Balancing in NUMA Computers M. Corrêa, R. Chanin, A. Sales, R. Scheer, A. Zorzo Technical Report Series Number 049 July,

More information

A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems

A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems Anton Beloglazov, Rajkumar Buyya, Young Choon Lee, and Albert Zomaya Present by Leping Wang 1/25/2012 Outline Background

More information

Energy-Aware Multi-agent Server Consolidation in Federated Clouds

Energy-Aware Multi-agent Server Consolidation in Federated Clouds Energy-Aware Multi-agent Server Consolidation in Federated Clouds Alessandro Ferreira Leite 1 and Alba Cristina Magalhaes Alves de Melo 1 Department of Computer Science University of Brasilia, Brasilia,

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.

More information

The Probabilistic Model of Cloud Computing

The Probabilistic Model of Cloud Computing A probabilistic multi-tenant model for virtual machine mapping in cloud systems Zhuoyao Wang, Majeed M. Hayat, Nasir Ghani, and Khaled B. Shaban Department of Electrical and Computer Engineering, University

More information

Windows Server Performance Monitoring

Windows Server Performance Monitoring Spot server problems before they are noticed The system s really slow today! How often have you heard that? Finding the solution isn t so easy. The obvious questions to ask are why is it running slowly

More information

An Oracle Technical White Paper November 2011. Oracle Solaris 11 Network Virtualization and Network Resource Management

An Oracle Technical White Paper November 2011. Oracle Solaris 11 Network Virtualization and Network Resource Management An Oracle Technical White Paper November 2011 Oracle Solaris 11 Network Virtualization and Network Resource Management Executive Overview... 2 Introduction... 2 Network Virtualization... 2 Network Resource

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer

More information

Rackspace Cloud Databases and Container-based Virtualization

Rackspace Cloud Databases and Container-based Virtualization Rackspace Cloud Databases and Container-based Virtualization August 2012 J.R. Arredondo @jrarredondo Page 1 of 6 INTRODUCTION When Rackspace set out to build the Cloud Databases product, we asked many

More information

Virtualization Technologies (ENCS 691K Chapter 3)

Virtualization Technologies (ENCS 691K Chapter 3) Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing

More information

Dynamic memory Allocation using ballooning and virtualization in cloud computing

Dynamic memory Allocation using ballooning and virtualization in cloud computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IV (Mar-Apr. 2014), PP 19-23 Dynamic memory Allocation using ballooning and virtualization

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

Resource usage monitoring for KVM based virtual machines

Resource usage monitoring for KVM based virtual machines 2012 18th International Conference on Adavanced Computing and Communications (ADCOM) Resource usage monitoring for KVM based virtual machines Ankit Anand, Mohit Dhingra, J. Lakshmi, S. K. Nandy CAD Lab,

More information

How To Use The Cisco Wide Area Application Services (Waas) Network Module

How To Use The Cisco Wide Area Application Services (Waas) Network Module Cisco Wide Area Application Services (WAAS) Network Module The Cisco Wide Area Application Services (WAAS) Network Module for the Cisco Integrated Services Routers (ISR) is a powerful WAN optimization

More information